{"id":9525,"date":"2018-07-24T06:55:39","date_gmt":"2018-07-24T10:55:39","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=9525"},"modified":"2021-08-01T01:18:22","modified_gmt":"2021-08-01T05:18:22","slug":"hospital-safety-checklist-positive-patient-identification","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/","title":{"rendered":"Add biometric patient &amp; visitor identification to your hospital safety checklist"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Hospital safety checklist is prioritized nowadays, but the question remains, is it enough? Are all measures taken to restrict intruders? Needless to say, hospitals require safety and security measures strongly. Despite having so many patients and so much medical data, security concerns are lower at any hospital, which makes it an easy target for possible data breach and or threat to the patients and staffs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With so many people going in and out all the time it is quite impossible to properly check everyone all the time. In case of an emergency check the patient or the accompanying person cannot be questioned and for obvious reasons. During patient visiting hours, many people come in to visit. All these visitors are let pass without proper identification and registration. Also to properly security check every visitor, it will take a lot of time and people will take it as an extra harassment. \u00a0However, all these factors could pose a serious threat to the hospital and people associated with it. Many hospitals faced some serious issues regarding this.<\/span><\/p>\n<div class=\"caseWrapper\">\n<h6 style=\"text-align: center; font-size: 18px; padding-bottom: 0; font-weight: 600; background: #f2f2f2; padding: 5px 0;\">Free Case Study<\/h6>\n<div class=\"caseLogo\"><a href=\"https:\/\/www.m2sys.com\/blog\/case-study-on-implementation-of-iris-biometrics-for-patient-identification\/?utm_source=blog&amp;utm_medium=cace%20study&amp;utm_campaign=implementation%20of%20iris%20biometrics%20for%20patient%20identification\"><img loading=\"lazy\" decoding=\"async\" class=\"size-thumbnail wp-image-5480\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/05\/novant-health-150x150.jpg\" alt=\"implementation-of-iris-biometrics-for-patient-identification\" width=\"150\" height=\"150\" \/><\/a><\/div>\n<div class=\"caseInfo\">\n<h3>Implementation of Iris Biometrics for Patient Identification at Novant Health<\/h3>\n<p><a class=\"caseLink\" href=\"https:\/\/www.m2sys.com\/blog\/case-study-on-implementation-of-iris-biometrics-for-patient-identification\/?utm_source=blog&amp;utm_medium=cace%20study&amp;utm_campaign=implementation%20of%20iris%20biometrics%20for%20patient%20identification\">Download<\/a><\/p>\n<\/div>\n<\/div>\n<p><span style=\"font-weight: 400;\">A hospital requires a system that they can ensure proper security check, not disrupting the visiting process, so that service takers remains happy. So, what could be the solution so that a hospital can keep track of their patient and visitors and still ensure a high level of customer satisfaction? And that is a proper visitor management system that fits especially a hospital\u2019s needs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Not all the visitor management system in the market can properly serve a hospital. A hospital, in particular, has a unique set of requirement that is so much necessary to strictly follow.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There is a lot of visitor management system in the market, but among all these VisitorTrack\u2122 is the best fit for any hospital to ensure better security and serviceability.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So why is <\/span><a href=\"https:\/\/www.m2sys.com\/visitor-track-biometric-visitor-management-solution\/?utm_source=blog&amp;utm_medium=VisitorTrack&amp;utm_campaign=Hospital+Safety+Checklist\"><b>VisitorTrack\u2122<\/b><\/a><span style=\"font-weight: 400;\"> better than any other in the software market? It just cannot be a blatant claim without any proof! So here why it is \u2013<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Any system when installed is done with a view to reducing cost and losses. The idea behind the mind is that this software will help the company with their service and operations. Taking into account this two information let us examine the visitor management systems in the market.<\/span><\/p>\n<style type=\"text\/css\">\r\n.ad-area1 { border-radius: 8px; overflow: hidden; padding: 20px 10px; box-shadow: 0 0px 15px #ddd; margin: 15px 8px; border-top: 5px solid #a81010; }\r\n.left-area, .right-area { width: 50%; float: left; }\r\n.left-area { padding-top: 12px; }\r\n.left-area img { max-width: 95%; }\r\n.right-area h2 { text-align: center; padding-bottom: 0; font-size: 26px; font-weight: 900; margin-top: 0; }\r\n.right-area h2 span { color: #a81010; }\r\n.right-area h3 { text-align: center; font-size: 16px; text-transform: capitalize; font-weight: 700; padding-top: 10px; padding-bottom: 10px; line-height: normal; }\r\n.ad-area-head { text-align: center; font-weight: 900; font-size: 14px; border-bottom: 1px dotted #ddd; width: 70%; margin: 0 auto; }\r\n.ad-area-desc { padding: 5px 0; }\r\n.right-area p { text-align: center; font-size: 12px; padding-bottom: 0; margin: 0; line-height: 2; }\r\n.ad-area-desc b { font-weight: 700; display: block; }\r\n.ad-area1-learn { display: table; margin: 0 auto; background: #a81010; color: #fff; padding: 6px 20px; border-radius: 50px; font-size: 14px; }\r\n.ad-area1-learn:hover { color: #fff; }\r\n\r\n@media (max-width:320px), (max-width:360px), (max-width:375px), (max-width:400px), (max-width:480px) {\r\n.left-area, .right-area { width: 100%; float: none; }\r\n}\r\n<\/style>\r\n<div class=\"ad-area1\">\r\n\t<div style=\"overflow: hidden;\">\r\n\t\t<div class=\"left-area\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2019\/01\/VisitorTrack.png\" alt=\"Bio-plugin-SDK\" width=\"\">\r\n\t\t<\/div>\r\n\t\t<div class=\"right-area\">\r\n\t\t\t<h2><span>VisitorTrack\u2122 <\/span><\/h2>\r\n\t\t\t<h3> Biometric Visitor Management Solution<\/h3>\r\n\t\t\t<div class=\"ad-area-head\"><\/div>\r\n\t\t\t<div class=\"ad-area-desc\">\r\n\t\t\t\t<p>Replace manual log, ID Cards\/Badges with a secure, modern and affordable biometric solution to safeguard your premises. <\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<a class=\"ad-area1-learn\" href=\"https:\/\/www.m2sys.com\/visitor-track-biometric-visitor-management-solution\/\">Learn More<\/a>\r\n\t\t<\/div>\r\n\t<\/div>\t\r\n<\/div>\n<p><span style=\"font-weight: 400;\">All the visitor management systems in the market are made by various well-known software vendors and makers. The prices of these systems vary between high medium to a very high range. The logic behind the pricing must be the software being a B2B product. Also, in general, a visitor management system is comprised of a system, a printer that prints cards or special adhesive paper badges and of course, ink cartridges. Now we will take a look at the promise that software is making to us, \u201cRemove paperwork, and use Jane Doe visitor management software\u201d.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you look closely the paper is not removed from your system. It has just been promoted to a badge or a printed ID card. Also, all those printing will cost you a lot of extra money along with the cost of maintenance of all these hardware and ink costs. Besides, what if twins steal identity or a look-alike people comes in and fakes identity, the system will not be able to detect it. No matter how many times a visitor came to the facility previously, he or she has to go through the same process again and again. This is an irritating experience for any visitor. Also, in a hospital, people are in a hurry to see their patients. So they will not like a long list of information every time they check in.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now, if you take a look at the M2SYS VisitorTrack\u2122 cloud visitor management solution, you will be able to see that, this solution is a cloud-based application, which makes it less costly at the start since you will not need any local server or hosting hardware support. Then it is totally paperless using a digital badge directly sent to the visitor\u2019s mobile, which can be scanned to ensure the authenticity of the visit. Moreover, it is biometric authentication based visitor management system, which means, visitors will have to verify their identity using biometric verification such as fingerprint, facial recognition, iris scan, finger vein recognition and or palm vein recognition. With <\/span><a href=\"https:\/\/www.m2sys.com\/m2-auto-tilt-iris-recognition-camera\/?utm_source=blog&amp;utm_medium=M2-AutoTilt%E2%84%A2+Iris+scanner&amp;utm_campaign=Hospital+Safety+Checklist\"><b>M2-AutoTilt\u2122 Iris scanner<\/b><\/a><span style=\"font-weight: 400;\"> \u2013 iris recognition camera, the process will be contactless and hygiene what should be inside a hospital.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">VisitorTrack\u2122 is so great to have because you do not have to fill in every info of your visitor each time they come in. You will just have to do it once and from the next time they visit, they will just have to scan their biometric to authenticate the visit. You will be able to directly assign the visiting hour and visiting patient. You will also be able to take pictures of the visitor or visitor\u2019s NID, passport, or any other valuable document and store in the visitor\u2019s profile for future references. This makes life a lot easier and secure at any hospital.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This super time saving and fantastic VisitorTrack\u2122 from M2SYS will not only save time and money of your hospital but also help save lives.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hospital safety checklist is prioritized nowadays, but the question remains, is it enough? Are all measures taken to restrict intruders?<\/p>\n","protected":false},"author":396,"featured_media":15914,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Hospital Safety Checklist","_yoast_wpseo_title":"Hospital Safety Checklist \u2714\ufe0f Positive Patient Identification","_yoast_wpseo_metadesc":"Hospitals require safety and security measures strongly and one of the checklist every hospital must ensure is Positive Patient Identification system.","_lmt_disableupdate":"","_lmt_disable":"","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[197],"tags":[292,855,854],"class_list":["post-9525","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-patient-identification","tag-biometric-patient-identification","tag-hospital-safety-checklist","tag-positive-patient-identification"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hospital Safety Checklist \u2714\ufe0f Positive Patient Identification<\/title>\n<meta name=\"description\" content=\"Hospitals require safety and security measures strongly and one of the checklist every hospital must ensure is Positive Patient Identification system.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hospital Safety Checklist \u2714\ufe0f Positive Patient Identification\" \/>\n<meta property=\"og:description\" content=\"Hospitals require safety and security measures strongly and one of the checklist every hospital must ensure is Positive Patient Identification system.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-24T10:55:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-01T05:18:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/07\/checklist-box-PTH8EMY-1024x683.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Masum Shibli\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/masum_shibli\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Masum Shibli\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/\"},\"author\":{\"name\":\"Masum Shibli\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/5b30f2f77d4bb7ef32254321a238a13b\"},\"headline\":\"Add biometric patient &amp; visitor identification to your hospital safety checklist\",\"datePublished\":\"2018-07-24T10:55:39+00:00\",\"dateModified\":\"2021-08-01T05:18:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/\"},\"wordCount\":948,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"biometric patient identification\",\"Hospital Safety Checklist\",\"Positive Patient Identification\"],\"articleSection\":[\"Patient Identification\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/\",\"name\":\"Hospital Safety Checklist \u2714\ufe0f Positive Patient Identification\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2018-07-24T10:55:39+00:00\",\"dateModified\":\"2021-08-01T05:18:22+00:00\",\"description\":\"Hospitals require safety and security measures strongly and one of the checklist every hospital must ensure is Positive Patient Identification system.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Add biometric patient &amp; visitor identification to your hospital safety checklist\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/5b30f2f77d4bb7ef32254321a238a13b\",\"name\":\"Masum Shibli\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1e88467c8cf79a053bb898764e8e8c48?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1e88467c8cf79a053bb898764e8e8c48?s=96&d=mm&r=g\",\"caption\":\"Masum Shibli\"},\"description\":\"Business Development Analyst, M2SYS Technology\",\"sameAs\":[\"https:\/\/twitter.com\/https:\/\/twitter.com\/masum_shibli\"],\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/shibli\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hospital Safety Checklist \u2714\ufe0f Positive Patient Identification","description":"Hospitals require safety and security measures strongly and one of the checklist every hospital must ensure is Positive Patient Identification system.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/","og_locale":"en_US","og_type":"article","og_title":"Hospital Safety Checklist \u2714\ufe0f Positive Patient Identification","og_description":"Hospitals require safety and security measures strongly and one of the checklist every hospital must ensure is Positive Patient Identification system.","og_url":"https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2018-07-24T10:55:39+00:00","article_modified_time":"2021-08-01T05:18:22+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/07\/checklist-box-PTH8EMY-1024x683.jpg","type":"image\/jpeg"}],"author":"Masum Shibli","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/masum_shibli","twitter_site":"@m2sys","twitter_misc":{"Written by":"Masum Shibli","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/"},"author":{"name":"Masum Shibli","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/5b30f2f77d4bb7ef32254321a238a13b"},"headline":"Add biometric patient &amp; visitor identification to your hospital safety checklist","datePublished":"2018-07-24T10:55:39+00:00","dateModified":"2021-08-01T05:18:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/"},"wordCount":948,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["biometric patient identification","Hospital Safety Checklist","Positive Patient Identification"],"articleSection":["Patient Identification"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/","url":"https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/","name":"Hospital Safety Checklist \u2714\ufe0f Positive Patient Identification","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2018-07-24T10:55:39+00:00","dateModified":"2021-08-01T05:18:22+00:00","description":"Hospitals require safety and security measures strongly and one of the checklist every hospital must ensure is Positive Patient Identification system.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/hospital-safety-checklist-positive-patient-identification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Add biometric patient &amp; visitor identification to your hospital safety checklist"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/5b30f2f77d4bb7ef32254321a238a13b","name":"Masum Shibli","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1e88467c8cf79a053bb898764e8e8c48?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1e88467c8cf79a053bb898764e8e8c48?s=96&d=mm&r=g","caption":"Masum Shibli"},"description":"Business Development Analyst, M2SYS Technology","sameAs":["https:\/\/twitter.com\/https:\/\/twitter.com\/masum_shibli"],"url":"https:\/\/www.m2sys.com\/blog\/author\/shibli\/"}]}},"modified_by":"Collin Williams","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/9525"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/396"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=9525"}],"version-history":[{"count":6,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/9525\/revisions"}],"predecessor-version":[{"id":15915,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/9525\/revisions\/15915"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/15914"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=9525"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=9525"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=9525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}